Author:
Shrestha Prakash,Saxena Nitesh
Publisher
Springer International Publishing
Reference29 articles.
1. Abu-Mahfouz, A., Hancke, G.P.: Distance bounding: a practical security solution for real-time location systems. IEEE Trans. Ind. Inf. 9(1), 16–27 (2013)
2. Acar, A., Aksu, H., Uluagac, A.S., Akkaya, K.: WACA: wearable-assisted continuous authentication. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 264–269. IEEE (2018)
3. Avoine, G., et al.: Security of distance-bounding: a survey. ACM Comput. Surv. (2017)
4. Bahl, P., Padmanabhan, V.N.: Radar: an in-building RF-based user location and tracking system. In: INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, pp. 775–784. IEEE (2000)
5. Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627–638. ACM (2011)